0x4141414141 / Malware-DevlopmentLinks
Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C
☆39Updated 6 years ago
Alternatives and similar repositories for Malware-Devlopment
Users that are interested in Malware-Devlopment are comparing it to the libraries listed below
Sorting:
- A small red team course☆40Updated 2 years ago
- Windows Administrator level Implant.☆50Updated last year
- ☆59Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆51Updated 2 years ago
- ☆38Updated 2 years ago
- Situational Awareness script to identify how and where to run implants☆67Updated last year
- POC of GITHUB simple C2 in rust☆52Updated 5 months ago
- Docker container for running CobaltStrike 4.10☆37Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Updated 9 months ago
- ☆36Updated 2 years ago
- Source code and examples for PassiveAggression☆64Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆88Updated last month
- ☆59Updated last year
- ☆106Updated last year
- EvtPsst☆55Updated 2 years ago
- IAT Unhooking proof-of-concept☆34Updated last year
- ☆42Updated last year
- in-process powershell runner for BRC4☆48Updated 2 years ago
- Analyse MSI files for vulnerabilities☆140Updated last year
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated 2 years ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆98Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Updated last year
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- .NET tool used to enrich RPC telemetry☆100Updated 7 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆42Updated 11 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year